Hash functions

Results: 1148



#Item
461Error detection and correction / Cryptographic hash functions / Advanced Encryption Standard / OpenSSL / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

OpenSSL FIPS Object Module Version[removed]By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2011-05-12 08:55:47
462Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
463Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
464Search algorithms / Information retrieval / Computing / Cryptographic hash functions / Hash function / Hash join / Relational database / Trie / Join / Hashing / Data management / Error detection and correction

APPLYING HASH FILTERS TO IMPROVING EXECUTION OF BUSHY TREES

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:13:59
465Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.potaroo.net

Language: English - Date: 2007-11-04 03:24:11
466Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2007-08-26 21:30:00
467Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.organicdesign.co.nz

Language: English - Date: 2011-06-18 04:34:18
468Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
469Mathematics / Search algorithms / Multiset / Hash function / Collision resistance / MD5 / SHA-1 / Collision / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking Dwaine Clarke? , Srinivas Devadas, Marten van Dijk?? , Blaise Gassend, G. Edward Suh MIT Computer Science and Artificial Intelligence

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
470Cryptography / Data management / Cryptographic hash functions / Error detection and correction / Checksum / Hash list / Inode / File system / Hash function / Computing / Disk file systems / Hashing

Enhancing File System Integrity Through Checksums Gopalan Sivathanu, Charles P. Wright, and Erez Zadok Stony Brook University Technical Report FSL-04-04

Add to Reading List

Source URL: www.fsl.cs.sunysb.edu

Language: English - Date: 2012-09-07 11:07:01
UPDATE